Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 25 of 31) sorted by relevance

12

/openssl-master/crypto/rand/
A Drand_pool.c66 size_t entropy) in ossl_rand_pool_attach() argument
86 pool->entropy = entropy; in ossl_rand_pool_attach()
128 return pool->entropy; in ossl_rand_pool_entropy()
149 pool->entropy = 0; in ossl_rand_pool_detach()
182 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_available()
188 return pool->entropy; in ossl_rand_pool_entropy_available()
198 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_needed()
199 return pool->entropy_requested - pool->entropy; in ossl_rand_pool_entropy_needed()
342 pool->entropy += entropy; in ossl_rand_pool_add()
399 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy) in ossl_rand_pool_add_end() argument
[all …]
A Dprov_seed.c16 unsigned char **pout, int entropy, in ossl_rand_get_entropy() argument
23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy()
/openssl-master/doc/man7/
A DEVP_RAND.pod20 systems's entropy sources and providing access to deterministic random
49 You need to integrate a previously unsupported entropy source.
63 An EVP_RAND instance can be used as the entropy source of another
67 it does not make sense for the child to be an entropy source.
73 a live entropy source may ignore and not use its parent.
131 | os entropy sources |
159 its entropy source. The entropy source can be either a trusted operating
192 reseeding of the DRBG with fresh entropy by setting the
200 entropy from a live entropy source (section 5.5.2 of [NIST SP 800-90C]).
240 pulls the necessary entropy from its source automatically.
[all …]
A DEVP_RAND-TEST-RAND.pod54 Sets the bytes returned when the test generator is sent an entropy request.
78 unsigned char entropy[1000] = { ... };
88 entropy, sizeof(entropy));
A Dprovider-rand.pod44 int entropy, size_t min_len, size_t max_len,
112 from a live entropy source. Additional input I<addin> of length I<addin_len>
123 security level of I<entropy> bits and there will be between I<min_len>
125 true, the bytes will be produced from a live entropy source. Additional
/openssl-master/include/crypto/
A Drand_pool.h81 size_t entropy; /* current entropy count in bits */ member
88 size_t entropy);
105 const unsigned char *buffer, size_t len, size_t entropy);
107 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
A Drand.h112 unsigned char **pout, int entropy,
/openssl-master/providers/implementations/rands/
A Ddrbg.c145 int entropy, size_t min_len, in ossl_drbg_get_seed() argument
154 bytes_needed = entropy >= 0 ? (entropy + 7) / 8 : 0; in ossl_drbg_get_seed()
365 unsigned char *nonce = NULL, *entropy = NULL; in ossl_prov_drbg_instantiate() local
451 entropylen = get_entropy(drbg, &entropy, min_entropy, in ossl_prov_drbg_instantiate()
460 if (!drbg->instantiate(drbg, entropy, entropylen, nonce, noncelen, in ossl_prov_drbg_instantiate()
462 cleanup_entropy(drbg, entropy, entropylen); in ossl_prov_drbg_instantiate()
466 cleanup_entropy(drbg, entropy, entropylen); in ossl_prov_drbg_instantiate()
505 unsigned char *entropy = NULL; in ossl_prov_drbg_reseed() local
579 entropylen = get_entropy(drbg, &entropy, drbg->strength, in ossl_prov_drbg_reseed()
588 if (!drbg->reseed(drbg, entropy, entropylen, adin, adinlen)) in ossl_prov_drbg_reseed()
[all …]
A Dtest_rng.c45 unsigned char *entropy, *nonce; member
71 OPENSSL_free(t->entropy); in test_rng_free()
110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate()
189 OPENSSL_free(t->entropy); in test_rng_set_ctx_params()
190 t->entropy = ptr; in test_rng_set_ctx_params()
231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument
238 *pout = t->entropy; in test_rng_get_seed()
A Ddrbg_local.h79 const unsigned char *entropy, size_t entropylen,
185 const unsigned char *entropy, size_t entropylen,
254 int entropy, size_t min_len, size_t max_len,
A Dseed_src.c178 int entropy, size_t min_len, size_t max_len, in seed_get_seed() argument
191 bytes_needed = entropy >= 0 ? (entropy + 7) / 8 : 0; in seed_get_seed()
A Ddrbg_ctr.c307 const unsigned char *entropy, size_t entropylen, in drbg_ctr_instantiate() argument
313 if (entropy == NULL) in drbg_ctr_instantiate()
322 if (!ctr_update(drbg, entropy, entropylen, pers, perslen, nonce, noncelen)) in drbg_ctr_instantiate()
342 const unsigned char *entropy, size_t entropylen, in drbg_ctr_reseed() argument
347 if (entropy == NULL) in drbg_ctr_reseed()
351 if (!ctr_update(drbg, entropy, entropylen, adin, adinlen, NULL, 0)) in drbg_ctr_reseed()
A Dcrngt.c104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() argument
142 bytes_needed = (entropy + 7) / 8; in ossl_crngt_get_entropy()
/openssl-master/doc/man3/
A DRAND_bytes.pod52 was able to seed itself from a trusted entropy source.
57 If the entropy source fails or is not available, the CSPRNG will enter an
62 On other platforms, there might not be a trusted entropy source available
63 or OpenSSL might have been explicitly configured to use different entropy sources.
64 If you are in doubt about the quality of the entropy source, don't hesitate to ask
A DRAND_add.pod34 itself automatically using trusted system entropy sources.
42 random input obtained from polling various trusted entropy sources.
43 The default choice of the entropy source can be modified at build time,
59 be a trusted entropy source. It is mixed into the internal state of the RNG as
A DEVP_RAND.pod117 system entropy sources.
132 If I<prediction_resistance> is specified, fresh entropy from a live source
142 If I<prediction_resistance> is specified, fresh entropy from a live source
145 EVP_RAND_reseed() reseeds the RAND with new entropy.
150 operating system. If I<prediction_resistance> is specified, fresh entropy
A DOPENSSL_fork_prepare.pod28 the entropy pool used to generate random numbers (and therefore encryption
A DRAND_egd.pod5 RAND_egd, RAND_egd_bytes, RAND_query_egd_bytes - query entropy gathering daemon
A DRAND_set_rand_method.pod48 int (*add)(const void *buf, int num, double entropy);
/openssl-master/providers/common/
A Dprovider_seeding.c48 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() argument
53 pout, entropy, min_len, max_len); in ossl_prov_get_entropy()
/openssl-master/providers/implementations/include/prov/
A Dseeding.h34 int entropy, size_t min_len, size_t max_len);
/openssl-master/doc/internal/man3/
A Dossl_rand_get_entropy.pod14 unsigned char **pout, int entropy,
27 The seeding material will have at least I<entropy> bytes of randomness and is
/openssl-master/doc/man1/
A Dopenssl-rand.pod.in26 seed itself successfully from a trusted operating system entropy source.
/openssl-master/include/openssl/
A Dcore_dispatch.h189 unsigned char **pout, int entropy,
500 int entropy, size_t min_len, size_t max_len,
/openssl-master/crypto/err/
A Dopenssl.txt967 PROV_R_ENTROPY_SOURCE_STRENGTH_TOO_WEAK:186:entropy source strength too weak
969 PROV_R_ERROR_RETRIEVING_ENTROPY:189:error retrieving entropy
1048 PROV_R_PARENT_CANNOT_SUPPLY_ENTROPY_SEED:187:parent cannot supply entropy seed
1090 RAND_R_ENTROPY_INPUT_TOO_LONG:106:entropy input too long
1091 RAND_R_ENTROPY_OUT_OF_RANGE:124:entropy out of range
1092 RAND_R_ERROR_ENTROPY_POOL_WAS_IGNORED:127:error entropy pool was ignored
1096 RAND_R_ERROR_RETRIEVING_ENTROPY:110:error retrieving entropy

Completed in 31 milliseconds

12